The DON’T MAKE ME STEAL Digital Media Consumption Manifesto
Archive for 2011/02/05
It is about a project in two Italian towns to construct a citizen-owned WiFi mesh network that will allow direct communication of all participants and will link into the internet at provider level. Mesh networking (topology) is a type of networking where each node must not only capture and disseminate its own data, but also serve as a relay for other sensor nodes, that is, it must collaborate to propagate the data in the network.
1: Avoid registering domains that are handled by VeriSign or Afilias.
2: Avoid using a US-based domain registrar.
3: Avoid hosting your site with US companies.
4: Avoid incorporating as a US business. No more Delaware.
5: Adopt a DMCA-like procedure to take down reported content.
6: Legal uses of your product versus possible illegal uses.
7: Know the law, know the truth
8: Unite, work together
Yes, services such as Twitter and Facebook give activists the means to organize as never before. But the more dependent on them we become, the more subservient we are to the corporations and governments that control themPosted: 2011/02/05 in Blocking, Education / Awareness, Filtering, Public Policy
Internet is easy prey for governments
“I think the American reaction has been odd and it’s been partly coloured by the furore over WikiLeaks itself,” said Ross. “Everybody’s got an opinion about WikiLeaks and Julian Assange, but remarkably few people seem to be reading the cables.”
Hackers have repeatedly penetrated the computer network of the company that runs the Nasdaq Stock Market during the past year, and federal investigators are trying to identify the perpetrators and their purpose, according to people familiar with the matter.
The exchange’s trading platform—the part of the system that executes trades—wasn’t compromised, these people said. However, it couldn’t be determined which other parts of Nasdaq’s computer network were accessed.
Investigators are considering a range of possible motives, including unlawful financial gain, theft of trade secrets and a national-security threat designed to damage the exchange.
Combating a DDoS attack is tricky because it is hard to distinguish botnet activity from that of ordinary users. “The most challenging issue is how to detect an attack that involves a large number of attacking hosts,” says Jaydip Sen of Tata Consultancy Services in Kolkata, India. So he has developed a set of tests that aim to do precisely that. Sen devised algorithms that measure how much data the server is receiving, and from which computers. The figures are then compared with levels of traffic these computers send on an average day. Hosts with an unusual burst of activity are put through another level of complex statistical analysis to identify exactly which ones are launching the attacks.
Once a server running Sen’s software has worked out where the attack is coming from, it can block traffic from the culpable IP addresses until the threat subsides. Announcing the work earlier this month at the First International Conference on Computer Science and Technology in Bangalore, India, Sen claimed the technique is so good that it has not made a mistake yet.